首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
90
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
①
选项
A、different
B、same
C、public
D、private
答案
B
解析
转载请注明原文地址:https://kaotiyun.com/show/2F0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
有两个自然数a、b,已知两数之和是31,两数之积是750的约数,则|a-b|=()。
从4名男生3名女生中选择4人参加老吕暑假集训营,若这4个人中既有男生又有女生,则不同的选法有()种。
1968年建成的南京长江大桥,丰水区的净空高度是24米,理论上最多能通过3000吨级的船舶,在经济高速发展的今天已经成为“腰斩”长江水道、阻碍巨轮畅行的建筑。一位桥梁专家断言:要想彻底疏通长江黄金水道,必须拆除并重建南京长江大桥。以下哪项如果为
最近的一次跨文化研究表明,一般结婚的人比离婚而没有再婚的人的寿命长。这一事实说明离婚的压力对健康有不利影响。以下哪项如果为真,则指出了上述观点的错误?
一组数据有10个,每个数据与它们的平均数的差依次为-2,4,-4,5,-1,-2,0,2,3,-5,则这组数据的方差为()。
从7人中选派5人到10个不同的交通岗当中的5个参加交通协管工作,则不同的选派方法有()。
结合材料回答问题:华为从容的背后,有我们时代的整体加持华为遭遇美国极限施压之际,任正非接受媒体采访的内容刷屏。中国企业与中国企业家的自信、大气与从容,呈现于谈笑风生之间。从时代的角度审视,我
结合材料回答问题:材料1346支国家医疗队、4万多名医务人员毅然奔赴前线,很多人在万家团圆的除夕之夜踏上征程。人民军队医务人员牢记我军宗旨,视疫情为命令,召之即来,来之能战,战之能胜。……人民是真正的英雄。回顾抗击新
Mostmalesintheanimalkingdomdolittleparenting.Sometimes,though,parentalinvestmentbyamalepaysoff.Songbirdchicks
阅读下列案例内容,回答并计算问题1至问题4,将解答填入答题纸的对应栏内。【说明】A公司新接到一个IDC运营商B的服务需求,服务对象包括数十台的网络设备和存储设备,以及一个机房的空调和柴发装置。但A公司的服务能力主要在IT设备领域,基础设施服务没有积累。
随机试题
为了克服根据地严重的经济困难,中共中央采取实施的李鼎铭的提案是()
抗消化性溃疡药包括
患者,女,28岁,4d前行剖宫产手术,术后出现头痛,伴恶心呕吐,立位时明显,卧位时减轻,头MRI未见异常。考虑诊断为
淋病的平均潜伏期尖锐湿疣的平均潜伏期是
()开展经常性安全教育可以采用多种形式,如知识竞赛、黑板报、广播、放录象等。
中国四大木版年画的产地是()。
简述教师为幼儿提供游戏材料应该注意什么问题。
(2011年河北.27)下列各句中,没有语病的一句是()。
心理契约
设x是整型变量,与函数IIf(x>0,-x,x)有相同结果的代数式是
最新回复
(
0
)